Authentication & authorization

Authentication & authorization News

  • November 22, 2016 22 Nov'16

    IT leadership tenets: How to become a relationship-driven CIO

    Executive coach Michelle Lederman schooled the audience at SIMposium 2016 on the three leadership tenets of the relationship-driven executive.

  • November 21, 2016 21 Nov'16

    The UK’s answer for Identity Governance and Admin

    UK-based identity and access management (IAM) vendor ProofID has revamped and renamed it ARMS product. Now called ProofID IGA (Identity Governance and Admin) its prime use case is to aid the ...

  • November 08, 2016 08 Nov'16

    Poor OAuth implementation leaves millions at risk of stolen data

    Researchers find widespread risk for users of apps with insecure OAuth implementation, which could lead to attackers being able to access the data held within a vulnerable app.

  • October 11, 2016 11 Oct'16

    DRM 2.0

    Digital rights management is evolving in response to the rise of cloud services, the diversification of user end-points and increasing cyber-threats. New products are emerging to overcome the ...

View All News

Authentication & authorization Get Started

Bring yourself up to speed with our introductory content

  • VMware Access Point allows safe access to end-user computing resources

    VMware Access Point relies on authentication, verification and isolation to create a secure gateway through which users can access end-user computing resources. Continue Reading

  • Seamless authentication and access management: Securing the connected car and customer experience

    As the connected car becomes more mainstream, car manufacturers require an identity and access management system that's both reliable and agile. Continue Reading

  • Augmented reality technology is coming to a business near you

    Workers around the world found themselves following Pokémon Go characters into the lunchroom and around their office parks this year. It won't be the last time we see augmented reality technology in the workplace. Manufacturing companies can use augmented reality technology to let workers view blueprints hands-free, for instance, and AR can help others gain powerful insight into how users interact with certain apps. This issue's cover story delves into business uses for AR.

    Plus, learn how developers must take browser capabilities into consideration when creating web apps. In this month's Deep Dive, get to know the ins and outs of identity and access management as a service -- a technology that's becoming more critical as users are more tied to their profiles than ever. And in a Q&A with the inventor of the term COPE, learn why businesses should consider the corporate-owned, personally-enabled device model. One such device companies may be adopting is Apple's latest, the iPhone 7, featured in this month's Device Spotlight. Finally, editors look back at the big end-user computing trends of 2016 and peek at what's to come in 2017.

     Continue Reading

View All Get Started

Evaluate Authentication & authorization Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Authentication & authorization

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Authentication & authorization Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

ComputerWeekly

Close